Modeling Strong Physically Unclonable Functions with Metaheuristics

Carlos Coello Coello, Marina Krcek, Marko Durasevic, Luca Mariot, Domagoj Jakobovic, Stjepan Picek

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

6 Downloads (Pure)

Abstract

Evolutionary algorithms have been successfully applied to attack Physically Unclonable Functions (PUFs). CMA-ES is recognized as the most powerful option for a type of attack called the reliability attack. In this paper, we take a step back and systematically evaluate several metaheuristics for the challenge-response pair-based attack on strong PUFs. Our results confirm that CMA-ES has the best performance, but we note several other algorithms with similar performance while having smaller computational costs.

Original languageEnglish
Title of host publicationGECCO 2023 Companion - Proceedings of the 2023 Genetic and Evolutionary Computation Conference Companion
PublisherAssociation for Computing Machinery (ACM)
Pages719-722
Number of pages4
ISBN (Electronic)9798400701207
DOIs
Publication statusPublished - 2023
Event2023 Genetic and Evolutionary Computation Conference Companion, GECCO 2023 Companion - Lisbon, Portugal
Duration: 15 Jul 202319 Jul 2023

Publication series

NameGECCO 2023 Companion - Proceedings of the 2023 Genetic and Evolutionary Computation Conference Companion

Conference

Conference2023 Genetic and Evolutionary Computation Conference Companion, GECCO 2023 Companion
Country/TerritoryPortugal
CityLisbon
Period15/07/2319/07/23

Bibliographical note

Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • CMA-ES
  • CRP
  • Metaheuristics
  • Physically Unclonable Functions

Fingerprint

Dive into the research topics of 'Modeling Strong Physically Unclonable Functions with Metaheuristics'. Together they form a unique fingerprint.

Cite this